Behavioral task
behavioral1
Sample
194494fa369369f09a138920cf33c01e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
194494fa369369f09a138920cf33c01e.exe
Resource
win10v2004-20231215-en
General
-
Target
194494fa369369f09a138920cf33c01e
-
Size
57KB
-
MD5
194494fa369369f09a138920cf33c01e
-
SHA1
9e5ecf0d5be592b06d1683fe299a79e1684d5247
-
SHA256
78b3dbfb1d4c12fb569b00b4bc0c70f7b2fd457ce3237b2fcadb8db04ea2d747
-
SHA512
67f05c466c0562319e3d5fe1ae4376211dc67f40cb645907d4a3ba682e209539d657edf4b3ff2d74af7f8eba47ab1a0df1c592622d6c1481cfe4bfd3db1d6919
-
SSDEEP
768:ZvdoIxyYoq+39Pmy95frc//06MSi+IavQhfDv/X5S8skku8IfzbVYYWP4nyqyy/h:ZW6lA3QG5fG/06MSih/Eu8OBbWAK
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 194494fa369369f09a138920cf33c01e unpack001/out.upx
Files
-
194494fa369369f09a138920cf33c01e.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 128KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 52KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ